Bsod

Discussion in 'Software' started by manzoor, Aug 11, 2008.

  1. manzoor

    manzoor Private E-2

    Hi I'm getting BSODs since a week

    I have posted the dump files for review. I have posted all the 5 dump files

    Code:
    Microsoft (R) Windows Debugger Version 6.9.0003.113 X86
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [C:\WINDOWS\Minidump\Mini081108-02.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows XP Kernel Version 2600 (Service Pack 2) MP (2 procs) Free x86 compatible
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 2600.xpsp_sp2_rtm.040803-2158
    Kernel base = 0x804d7000 PsLoadedModuleList = 0x8055c700
    Debug session time: Mon Aug 11 10:27:42.921 2008 (GMT-7)
    System Uptime: 0 days 0:57:04.614
    Loading Kernel Symbols
    ..................................................................................................................
    Loading User Symbols
    Loading unloaded module list
    .............
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 1000000A, {256, 1c, 0, 804feda3}
    
    Probably caused by : kbdclass.sys ( kbdclass!KeyboardClassServiceCallback+182 )
    
    Followup: MachineOwner
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    IRQL_NOT_LESS_OR_EQUAL (a)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If a kernel debugger is available get the stack backtrace.
    Arguments:
    Arg1: 00000256, memory referenced
    Arg2: 0000001c, IRQL
    Arg3: 00000000, bitfield :
    	bit 0 : value 0 = read operation, 1 = write operation
    	bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
    Arg4: 804feda3, address which referenced memory
    
    Debugging Details:
    ------------------
    
    
    READ_ADDRESS:  00000256 
    
    CURRENT_IRQL:  1c
    
    FAULTING_IP: 
    nt!KiInsertQueueApc+89
    804feda3 837e1000        cmp     dword ptr [esi+10h],0
    
    CUSTOMER_CRASH_COUNT:  2
    
    DEFAULT_BUCKET_ID:  DRIVER_FAULT
    
    BUGCHECK_STR:  0xA
    
    PROCESS_NAME:  Idle
    
    LAST_CONTROL_TRANSFER:  from 804fc1cf to 804feda3
    
    STACK_TEXT:  
    80550354 804fc1cf 85705228 857051e8 00000000 nt!KiInsertQueueApc+0x89
    80550374 804f1518 85705228 85cb59a8 00000000 nt!KeInsertQueueApc+0x51
    805503a8 f77d531c 00000000 85b0da28 80544400 nt!IopfCompleteRequest+0x1d8
    805503c4 f7594776 0000000c 85c21e08 8570530c kbdclass!KeyboardClassServiceCallback+0x182
    80550428 80544e5f 85b0dbd4 01b0d970 00000000 i8042prt!I8042KeyboardIsrDpc+0xf0
    80550440 8055ae40 ffdffc50 00000000 8055ae40 nt!KiRetireDpcList+0x61
    80550450 80544d44 00000000 0000000e 00000000 nt!KiIdleThread0
    80550454 00000000 0000000e 00000000 00000000 nt!KiIdleLoop+0x28
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    kbdclass!KeyboardClassServiceCallback+182
    f77d531c 6a18            push    18h
    
    SYMBOL_STACK_INDEX:  3
    
    SYMBOL_NAME:  kbdclass!KeyboardClassServiceCallback+182
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: kbdclass
    
    IMAGE_NAME:  kbdclass.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  41107b08
    
    FAILURE_BUCKET_ID:  0xA_kbdclass!KeyboardClassServiceCallback+182
    
    BUCKET_ID:  0xA_kbdclass!KeyboardClassServiceCallback+182
    
    Followup: MachineOwner
    ---------
    
    0: kd> 
    
    Code:
    Microsoft (R) Windows Debugger Version 6.9.0003.113 X86
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [C:\WINDOWS\Minidump\Mini081108-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows XP Kernel Version 2600 (Service Pack 2) MP (2 procs) Free x86 compatible
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 2600.xpsp_sp2_rtm.040803-2158
    Kernel base = 0x804d7000 PsLoadedModuleList = 0x8055c700
    Debug session time: Mon Aug 11 02:35:18.921 2008 (GMT-7)
    System Uptime: 0 days 0:11:47.613
    Loading Kernel Symbols
    ..............................................................................................................
    Loading User Symbols
    Loading unloaded module list
    ..........
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 1000008E, {c0000005, 805a50f5, eead1c68, 0}
    
    Probably caused by : ntkrpamp.exe ( nt!LpcpFreeDataInfoMessage+25 )
    
    Followup: MachineOwner
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    KERNEL_MODE_EXCEPTION_NOT_HANDLED_M (1000008e)
    This is a very common bugcheck.  Usually the exception address pinpoints
    the driver/function that caused the problem.  Always note this address
    as well as the link date of the driver/image that contains this address.
    Some common problems are exception code 0x80000003.  This means a hard
    coded breakpoint or assertion was hit, but this system was booted
    /NODEBUG.  This is not supposed to happen as developers should never have
    hardcoded breakpoints in retail code, but ...
    If this happens, make sure a debugger gets connected, and the
    system is booted /DEBUG.  This will let us see why this breakpoint is
    happening.
    Arguments:
    Arg1: c0000005, The exception code that was not handled
    Arg2: 805a50f5, The address that the exception occurred at
    Arg3: eead1c68, Trap Frame
    Arg4: 00000000
    
    Debugging Details:
    ------------------
    
    
    EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at "0x%08lx" referenced memory at "0x%08lx". The memory could not be "%s".
    
    FAULTING_IP: 
    nt!LpcpFreeDataInfoMessage+25
    805a50f5 8b5128          mov     edx,dword ptr [ecx+28h]
    
    TRAP_FRAME:  eead1c68 -- (.trap 0xffffffffeead1c68)
    ErrCode = 00000000
    eax=e1772500 ebx=00000000 ecx=00000000 edx=00000000 esi=00000001 edi=e10f3860
    eip=805a50f5 esp=eead1cdc ebp=eead1cdc iopl=0         nv up ei pl nz na pe cy
    cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010207
    nt!LpcpFreeDataInfoMessage+0x25:
    805a50f5 8b5128          mov     edx,dword ptr [ecx+28h] ds:0023:00000028=????????
    Resetting default scope
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  DRIVER_FAULT
    
    BUGCHECK_STR:  0x8E
    
    PROCESS_NAME:  services.exe
    
    LAST_CONTROL_TRANSFER:  from 805a40f4 to 805a50f5
    
    STACK_TEXT:  
    eead1cdc 805a40f4 e11657a8 00005437 00000000 nt!LpcpFreeDataInfoMessage+0x25
    eead1d54 8054060c 00000408 000d35a0 00c2fdb8 nt!NtReplyPort+0x1e4
    eead1d54 7c90eb94 00000408 000d35a0 00c2fdb8 nt!KiFastCallEntry+0xfc
    WARNING: Frame IP not in any known module. Following frames may be wrong.
    00c2fdb8 00000000 00000000 00000000 00000000 0x7c90eb94
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt!LpcpFreeDataInfoMessage+25
    805a50f5 8b5128          mov     edx,dword ptr [ecx+28h]
    
    SYMBOL_STACK_INDEX:  0
    
    SYMBOL_NAME:  nt!LpcpFreeDataInfoMessage+25
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    IMAGE_NAME:  ntkrpamp.exe
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  41107b0d
    
    FAILURE_BUCKET_ID:  0x8E_nt!LpcpFreeDataInfoMessage+25
    
    BUCKET_ID:  0x8E_nt!LpcpFreeDataInfoMessage+25
    
    Followup: MachineOwner
    ---------
    
    
    Code:
    Microsoft (R) Windows Debugger Version 6.9.0003.113 X86
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [C:\WINDOWS\Minidump\Mini081008-02.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows XP Kernel Version 2600 (Service Pack 2) MP (2 procs) Free x86 compatible
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 2600.xpsp_sp2_rtm.040803-2158
    Kernel base = 0x804d7000 PsLoadedModuleList = 0x8055c700
    Debug session time: Sun Aug 10 11:09:13.859 2008 (GMT-7)
    System Uptime: 0 days 2:03:05.558
    Loading Kernel Symbols
    ..................................................................................................................
    Loading User Symbols
    Loading unloaded module list
    .............
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 1000000A, {34, 2, 1, 806e4a16}
    
    Probably caused by : afd.sys ( afd!ExAllocateFromNPagedLookasideList+14 )
    
    Followup: MachineOwner
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    IRQL_NOT_LESS_OR_EQUAL (a)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If a kernel debugger is available get the stack backtrace.
    Arguments:
    Arg1: 00000034, memory referenced
    Arg2: 00000002, IRQL
    Arg3: 00000001, bitfield :
    	bit 0 : value 0 = read operation, 1 = write operation
    	bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
    Arg4: 806e4a16, address which referenced memory
    
    Debugging Details:
    ------------------
    
    
    WRITE_ADDRESS:  00000034 
    
    CURRENT_IRQL:  2
    
    FAULTING_IP: 
    hal!KeAcquireInStackQueuedSpinLock+26
    806e4a16 8711            xchg    edx,dword ptr [ecx]
    
    CUSTOMER_CRASH_COUNT:  2
    
    DEFAULT_BUCKET_ID:  DRIVER_FAULT
    
    BUGCHECK_STR:  0xA
    
    PROCESS_NAME:  EKRN.EXE
    
    LAST_CONTROL_TRANSFER:  from 804eeeb1 to 806e4a16
    
    STACK_TEXT:  
    ed721a3c 804eeeb1 85649698 8505dee8 8505dee8 hal!KeAcquireInStackQueuedSpinLock+0x26
    ed721a78 ee7934e5 85578040 ed721aa0 ee79e2f7 nt!IopfCallDriver+0x31
    ed721a84 ee79e2f7 85578040 85619401 ee795ba3 afd!ExAllocateFromNPagedLookasideList+0x14
    ed721b04 805bdd10 8576d8d0 00000000 851d69a8 afd!AfdGetBuffer+0x66
    ed721b7c 805ba398 00000000 ed721bbc 00000040 nt!ObpLookupObjectName+0x53c
    ed721bd0 80575de1 00000000 00000000 00000001 nt!ObOpenObjectByName+0xea
    ed721d54 8054060c 02e7e628 02e7e600 02e7e654 nt!NtQueryAttributesFile+0xf1
    ed721d54 7c90eb94 02e7e628 02e7e600 02e7e654 nt!KiFastCallEntry+0xfc
    WARNING: Frame IP not in any known module. Following frames may be wrong.
    02e7e654 00000000 00000000 00000000 00000000 0x7c90eb94
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    afd!ExAllocateFromNPagedLookasideList+14
    ee7934e5 85c0            test    eax,eax
    
    SYMBOL_STACK_INDEX:  2
    
    SYMBOL_NAME:  afd!ExAllocateFromNPagedLookasideList+14
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: afd
    
    IMAGE_NAME:  afd.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  485b8a15
    
    FAILURE_BUCKET_ID:  0xA_W_afd!ExAllocateFromNPagedLookasideList+14
    
    BUCKET_ID:  0xA_W_afd!ExAllocateFromNPagedLookasideList+14
    
    Followup: MachineOwner
    ---------
    
    
    Code:
    Microsoft (R) Windows Debugger Version 6.9.0003.113 X86
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [C:\WINDOWS\Minidump\Mini081008-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows XP Kernel Version 2600 (Service Pack 2) MP (2 procs) Free x86 compatible
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 2600.xpsp_sp2_rtm.040803-2158
    Kernel base = 0x804d7000 PsLoadedModuleList = 0x8055c700
    Debug session time: Sun Aug 10 03:01:53.625 2008 (GMT-7)
    System Uptime: 0 days 4:10:10.321
    Loading Kernel Symbols
    ..................................................................................................................
    Loading User Symbols
    Loading unloaded module list
    ...................
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 1000000A, {1, 1c, 0, 80501ffb}
    
    Probably caused by : ntkrpamp.exe ( nt!KiUnlinkThread+7 )
    
    Followup: MachineOwner
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    IRQL_NOT_LESS_OR_EQUAL (a)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If a kernel debugger is available get the stack backtrace.
    Arguments:
    Arg1: 00000001, memory referenced
    Arg2: 0000001c, IRQL
    Arg3: 00000000, bitfield :
    	bit 0 : value 0 = read operation, 1 = write operation
    	bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
    Arg4: 80501ffb, address which referenced memory
    
    Debugging Details:
    ------------------
    
    
    READ_ADDRESS:  00000001 
    
    CURRENT_IRQL:  1c
    
    FAULTING_IP: 
    nt!KiUnlinkThread+7
    80501ffb 8b10            mov     edx,dword ptr [eax]
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  DRIVER_FAULT
    
    BUGCHECK_STR:  0xA
    
    PROCESS_NAME:  Idle
    
    LAST_CONTROL_TRANSFER:  from 80502062 to 80501ffb
    
    STACK_TEXT:  
    805502b0 80502062 850107b0 850107b8 00000001 nt!KiUnlinkThread+0x7
    805502c4 80502259 00000000 805502e0 00000000 nt!KiUnwaitThread+0x12
    805502f0 80501472 f2d9e170 00000094 80550418 nt!KiWaitTest+0xab
    805503fc 8050165f 8055b0a0 ffdff9c0 ffdff000 nt!KiTimerListExpire+0x7a
    80550428 80544e5f 8055b4a0 00000000 000ea894 nt!KiTimerExpiration+0xb1
    80550440 8055ae40 ffdffc50 00000000 8055ae40 nt!KiRetireDpcList+0x61
    80550450 80544d44 00000000 0000000e 00000000 nt!KiIdleThread0
    80550454 00000000 0000000e 00000000 00000000 nt!KiIdleLoop+0x28
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt!KiUnlinkThread+7
    80501ffb 8b10            mov     edx,dword ptr [eax]
    
    SYMBOL_STACK_INDEX:  0
    
    SYMBOL_NAME:  nt!KiUnlinkThread+7
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    IMAGE_NAME:  ntkrpamp.exe
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  41107b0d
    
    FAILURE_BUCKET_ID:  0xA_nt!KiUnlinkThread+7
    
    BUCKET_ID:  0xA_nt!KiUnlinkThread+7
    
    Followup: MachineOwner
    ---------
    
    
    Code:
    Microsoft (R) Windows Debugger Version 6.9.0003.113 X86
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [C:\WINDOWS\Minidump\Mini080408-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows XP Kernel Version 2600 (Service Pack 2) MP (2 procs) Free x86 compatible
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 2600.xpsp_sp2_rtm.040803-2158
    Kernel base = 0x804d7000 PsLoadedModuleList = 0x8055c700
    Debug session time: Mon Aug  4 15:45:35.093 2008 (GMT-7)
    System Uptime: 0 days 0:53:11.785
    Loading Kernel Symbols
    ..................................................................................................................
    Loading User Symbols
    Loading unloaded module list
    ..............
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 1000000A, {a005c, 1c, 1, 80501ff4}
    
    Probably caused by : ntkrpamp.exe ( nt!KiUnlinkThread+0 )
    
    Followup: MachineOwner
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    IRQL_NOT_LESS_OR_EQUAL (a)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If a kernel debugger is available get the stack backtrace.
    Arguments:
    Arg1: 000a005c, memory referenced
    Arg2: 0000001c, IRQL
    Arg3: 00000001, bitfield :
    	bit 0 : value 0 = read operation, 1 = write operation
    	bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
    Arg4: 80501ff4, address which referenced memory
    
    Debugging Details:
    ------------------
    
    
    WRITE_ADDRESS:  000a005c 
    
    CURRENT_IRQL:  1c
    
    FAULTING_IP: 
    nt!KiUnlinkThread+0
    80501ff4 095154          or      dword ptr [ecx+54h],edx
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  DRIVER_FAULT
    
    BUGCHECK_STR:  0xA
    
    PROCESS_NAME:  Idle
    
    LAST_CONTROL_TRANSFER:  from 80502062 to 80501ff4
    
    STACK_TEXT:  
    805502b0 80502062 8567b730 8567b738 00000100 nt!KiUnlinkThread
    805502c4 80502259 00000000 805502e0 8567b70c nt!KiUnwaitThread+0x12
    805502f0 80501472 6e743531 000000f2 80550418 nt!KiWaitTest+0xab
    805503fc 8050165f 8055b0a0 ffdff9c0 ffdff000 nt!KiTimerListExpire+0x7a
    80550428 80544e5f 8055b4a0 00000000 00031df2 nt!KiTimerExpiration+0xb1
    80550440 8055ae40 ffdffc50 00000000 8055ae40 nt!KiRetireDpcList+0x61
    80550450 80544d44 00000000 0000000e 00000000 nt!KiIdleThread0
    80550454 00000000 0000000e 00000000 00000000 nt!KiIdleLoop+0x28
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt!KiUnlinkThread+0
    80501ff4 095154          or      dword ptr [ecx+54h],edx
    
    SYMBOL_STACK_INDEX:  0
    
    SYMBOL_NAME:  nt!KiUnlinkThread+0
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    IMAGE_NAME:  ntkrpamp.exe
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  41107b0d
    
    FAILURE_BUCKET_ID:  0xA_W_nt!KiUnlinkThread+0
    
    BUCKET_ID:  0xA_W_nt!KiUnlinkThread+0
    
    Followup: MachineOwner
    ---------
    
    
    Please review them, and tell me what's causing the problem. I can't figure it out by myself as I'm a noob :eek:
     
  2. Goran.P

    Goran.P MajorGeek

    Firstly,do you have logitech keyboard? if yes,uninstall and reinstall the driver.
    What about firewall?what is the brand?Do you have some Internet security program?I think the firewall is the problem.I will suggest to uninstall the one you have and install Comodo firewall.

    Write down the spec of your computer.
     
  3. manzoor

    manzoor Private E-2

    Nah I don't have anything of Logitech.

    I have an Intel 2.6 Pentium D processor, D865GSA motherboard, 512 MB RAM (2 x 256), Microsoft IntelliMouse 3.0 USB, A dell keyboard.

    And I don't have any firewall installed, the Windows Firewall is disabled too :). I have NOD32 Antivirus installed
     
  4. Goran.P

    Goran.P MajorGeek

    OK!
    reinstall the driver for dell keyboard(if you have) or go to My Computer(right click)>properties>Hardware>Device Manager>and find keyboard(right click),and hit uninstall>Reboot and upon reboot it will install the fresh one.And INSTALL Comodo firewall cos, you must.Uninstall NOD32 and install Avast.http://www.glaryutilities.com/processlibrary/process/ekrn.exe.html

    Reinstall your mouse diver,too.
     
    Last edited: Aug 12, 2008
  5. Adrynalyne

    Adrynalyne Guest

    I don't think this is keyboard related. That many random errors usually points at hardware problems. I would start with a good solid memory check (for several hours), followed by a chkdsk /r from recovery console.

    http://majorgeeks.com/Memtest86_d4226.html

    It has been in my experience if those two come up clean, you are looking at a motherboard, or overheating issue.
     
  6. Goran.P

    Goran.P MajorGeek

    Yes,but my point was to:kbdclass.sys(KeyboardClassService)and EKRN.EXE usualy point to NOD 32.
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds